Access Manager

Provide a know list of IP address from a simple text file. The file can be hand crafted. Or, can be downloaded from known set of vulnerable IP addresses. Configuring them in Administration Console is tedious. Use this tool to update a text file and see this is effected in “Risk Based Authentication” of NetIQ Access Manager

Apr 16, 2015
10:57 am
Reads:
66
Score:
Unrated

Previously I had posted a script for port redirection on the Identity Server. I’ve since found this doesn’t work too well when the local SLES firewall is enabled. The following is a better solution. First, create a Firewall Service file that contains the necessary ports to open (this assumes the Administration Console and Identity Server…

+ read more

ScorpionSting
Apr 14, 2015
1:09 pm
Reads:
75
Score:
5

If the rate and intensity at which my identity has been stolen in the past three years keeps pace, by 2017, I might as well advertise my personally identifiable information (PII) in blinking neon pink sky-writing and throw Mardi Gras beads from the airplane. First, my grocery store’s loyalty program was breached. Then I was…

+ read more

Rhonda Holloway
Apr 14, 2015
11:47 am
Reads:
484
Score:
Unrated

Oauth 2.0 is an open standard protocol for authorization that enables an application to access certain user information or resources from another web service, without giving the user’s credentials for the web service to the web application.

By: cstumula
Apr 2, 2015
9:06 am
Reads:
486
Score:
4.67

The old days of user access are gone Taking a least-privileged user approach for access control goes a long way in protecting your organization. But in today’s connected and mobile world, securing access purely from user permission level is not enough. Context needs to play a foundational role for assessing the risk of honoring those…

+ read more

Kent Purdy
Mar 30, 2015
11:13 am
Reads:
639
Score:
Unrated

Oftentimes organizations start their web presence by building it in-­-house. A common characteristic of such in–house developed solutions is that a database is used to hold user information such as user name, password, and additional information such as first and last name, email address, etc. As the web presence grows and requires more and more…

+ read more

By: wbusath
Mar 25, 2015
11:15 am
Reads:
496
Score:
Unrated

This Cool solution explains how to create Ajax based form login for user authentication.

By: cstumula
Mar 19, 2015
3:37 pm
Reads:
475
Score:
Unrated

If someone really needs to do something, they will find a way to do it. The wheel. Nails. The compass. Paper. The printing press. Light bulbs. Computers. The Internet. Running your own email server as the US Secretary of State. In the last 40 years, I don’t think there is a business person on the…

+ read more

Rhonda Holloway
Mar 17, 2015
9:02 am
Reads:
1,033
Score:
Unrated

NetIQ Access Manager can use OID (Oracle Internet Directory) as an identity source by using this custom LDAP server plug-in. The LDAP server plug-ins for NAM are incredibly simple because a mapping of attributes is all that is necessary since NAM already uses the LDAP protocol.

By: wbusath
Mar 16, 2015
12:34 pm
Reads:
488
Score:
Unrated